Search Results - (( ((web application) OR (its application)) based algorithm ) OR ( code application _ algorithm ))*
Search alternatives:
- code application »
- web application »
- its application »
-
1
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
2
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…However, the problem of cross-site scripting vulnerabilities present in web applications still persists. In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…However, the problem of cross-site scripting vulnerabilities present in web applications still persists. In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…As for the running method the compilation of the code will be run by using cmd and Ant Apache and the total average result of 30 simulation will be view on the web base application will be run using xampp.…”
Get full text
Get full text
Get full text
Academic Exercise -
6
Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding
Published 2007“…The essence of this study is to investigate the most efficient and effective training methods for use in image compression and its subsequent applications. The obtained results show that the Quasi-Newton based algorithm has better performance as compared to the other two algorithms.…”
Get full text
Get full text
Get full text
Article -
7
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
8
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Up until today, video compression algorithm has been applied in various video applications ranging from video conferencing to video telephony. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
10
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
Get full text
Get full text
Get full text
Thesis -
11
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…The FQR code encoder algorithm provided a novel enhancement to the colour QR code by adding a colour reference to its structure. …”
Get full text
Get full text
Thesis -
12
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
13
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The purpose of this project is to develop a web-based job recruiting system with implementation of sorting algorithm. …”
Get full text
Get full text
Thesis -
14
The evolution and trend of chain code scheme
Published 2008“…Since it was introduced by Freeman, the development of chain code and its application increases rapidly. This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. …”
Get full text
Get full text
Get full text
Article -
15
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Today, most web applications are vulnerable to SQL-injection attacks. …”
Get full text
Get full text
Get full text
Article -
16
Recent advances of whale optimization algorithm, its versions and applications
Published 2024“…One of the SI algorithms is called the whale optimization algorithm (WOA). …”
Book chapter -
17
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…The proposed new algorithm has more optimal CR than the various variants of the Huffman-based lossless application. …”
Get full text
Get full text
Get full text
Thesis -
18
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…Regarding the IME of H.264/AVC, we introduce two low cost bit-serial architectures, which are based on full search (FS) algorithm due to its regularity and coding performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Performance analysis of stopping turbo decoder iteration criteria
Published 2014Get full text
Get full text
Conference or Workshop Item -
20
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
Get full text
Get full text
Article
